search menu icon-carat-right cmu-wordmark

CERT Coordination Center


Microsoft Routing and Remote Access does not properly handle RPC requests

Vulnerability Note VU#631516

Original Release Date: 2006-06-13 | Last Revised: 2006-07-31

Overview

There is a vulnerability in the Microsoft Windows Routing and Remote Access Service that could allow an attacker to take control of the affected system.

Description

The Routing and Remote Access Service (RRAS) allows computers running the Windows 2000, XP, and Server 2003 operating systems to act as dial-up remote access server, virtual private network (VPN) server, Internet Protocol (IP) router, network address translator (NAT), and a dial-up and VPN site-to-site demand-dial router. RRAS replaced Remote Access Service (RAS) which was in Microsoft Windows NT.

There is an buffer overflow in the way Routing and Remote Access service handles RPC requests.

Microsoft reports that Windows 2000, Windows XP and Windows Server 2003 are vulnerable, but the RRAS service is not started by default on any platform except Windows 2000 Service Pack 4. Windows98 and Windows ME are not vulnerable. End-of-life Microsoft operating systems that use ICS (Internet Connection Sharing) may be vulnerable. Also, Microsoft ISA server requires the installation of a Windows 2000 or 2003 server operating system.

Exploit code for this vulnerability is publicly available.

Impact

A remote attacker could execute arbitrary code on a vulnerable system. This includes installing programs, viewing, changing or deleting data. The attacker may also create a denial-of-service condition.

Solution


Apply an Update

Apply the updates found in MS06-025.


Restrict Access

Restrict access to trusted hosts for ports 135/udp, 137/udp, 138/udp, 445/udp, 135/tcp, 139/tcp, 445/tcp, 593/tcp and any other ports used for RPC connections. Please see Microsoft Knowledgebase articles 826382, 309798, 313190, and 813878 for information about RPC ports and filtering.

Disable Unnecessary Services

Do not Enable the Routing and Remote Access Service if it is not needed.

Vendor Information

631516
Expand all

Microsoft Corporation

Notified:  June 13, 2006 Updated:  July 31, 2006

Status

  Vulnerable

Vendor Statement

No statement is currently available from the vendor regarding this vulnerability.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

There are no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A

References

Credit

Thanks to Microsoft for the information provided in MS06-025

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-2370
Severity Metric: 1.20
Date Public: 2006-06-13
Date First Published: 2006-06-13
Date Last Updated: 2006-07-31 18:12 UTC
Document Revision: 20

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.